A Revocable Backup System (extended abstract)
|
|
|
- Tyrone Andrews
- 10 years ago
- Views:
Transcription
1 A Revocable Backup System (extended abstract) Dan Boneh Richard J. Lipton 3 [email protected] [email protected] Department of Computer Science Princeton University Princeton, NJ Abstract We present a system which enables a user to remove a le from both the le system and all the backup tapes on which the le is stored. The ability to remove les from all backup tapes is desirable in many cases. Our system erases information from the backup tape without actually writing on the tape. This is achieved by applying cryptography in a new way: a block cipher is used to enable the system to \forget" information rather than protect it. Our system is easy to install and is transparent to the end user. Further, it introduces no slowdown in system performance and little slowdown in the backup procedure. 1 Introduction On many systems the remove-le command misleads the user into thinking that his le has been permanently removed. Usually the le is still available on a backup tape. This is an important feature used to protect against accidental le erasure or system crashes. However, it has the draw back that the user is unable to completely remove his les. In many scenarios it is desirable on the part of the user to erase all copies of a certain le. This is frequently the case with personal mail messages. Similarly, a user may wish to remove the history and cache les of his web browser. Other examples include a patient removing his medical les from the hospital's system upon checkout and nancial data that should be erased after a short period of time. Our goal is to make it so that the sensitive data becomes inaccessible to anyone (including the data's owner). A naive solution is to erase the data from the le 3 Supported in part by NSF CCR{ system. Then mount the backup tapes one by one and erase the sensitive data from them. This method is impractical for several reasons. First it inconveniences the user. To implement this scheme the user must call a computer operator whenever such an erasure is to take place. Furthermore, this method is quite complicated considering the backup policy which many institutes employ. Usually a backup of the entire le system is done once every time period, e.g. every month. The backup tape is then stored forever in a \cellar" or sometimes o site. This backup policy enables users to restore their entire directory structure to any point in the past. Clearly the naive approach is doomed to fail whenever this backup policy is used. The computer operator has to remove the data from many backup tapes. This procedure is painstaking, but is also insecure since the operator might \forget" to remove the data from one of the old backup tapes. We propose a system which avoids the problems mentioned above. Our system will enable the user to remove a le from the le system and all backup tapes without ever mounting a single tape. At rst this seems impossible: it is not possible to remove data from a tape without physically erasing the tape. Fortunately, cryptography enables us to do just that. The basic idea can be described as follows: when a le is backed up to tape it is rst encrypted using a randomly generated key. The encrypted version of the le is the one written to tape. When the user wishes to remove the le from the backup tape he instructs the system to \forget" the key used to encrypt the le. The act of forgetting the encryption key renders the data on the tape useless. No one, including the le owner, can ever access the le again. In eect, the le has been erased from the tape. Notice that the encrypt-before-backup is completely transparent to the user. It is crucial that no one but the operating system know which key was
2 used to encrypt the le during backup. This ensures that when the operating system is instructed to forget the encryption key, the tape data becomes unreadable. The rest of the paper is devoted to describing an implementation of the above idea. The tricky part of the implementation is managing the encryption keys. Clearly the encryption keys have to be backed up as well. We have devised several methods for backuping the encryption keys while still preserving the fundamental properties described above. It is interesting to compare our system to the cryptographic le system implemented by Blaze [2]. In a cryptographic le system the les are always stored in an encrypted form. Whenever a le needs to be accessed it is decrypted on the y using the owner's key. The backup tape is a direct dump of the le system, i.e. the tape contains the encrypted version of every le. Clearly the owner of the le is the only person who has access to the backed up version of the le. This does not guarantee that his backed up les will not be accessed by an unauthorized party. The owner might be forced to reveal his key, e.g. due to a court order. Thus, the cryptographic le system does not conform to our requirements: it does not guarantee that the backup tape data will not be accessed. On the other hand, in our scheme the backed up data becomes inaccessible to everyone once it is \erased" from the tape. In addition it is important to point out that our system is very easy to install. Only the backup system has to be modied. The cryptographic le system requires far more extensive modications. 2 Key management In this section we give a detailed description of our backup system. In our system the user can specify a collection of les that are to be encrypted during backup. Each such le has an encryption key associated with it. The encryption key has a life time which is specied by the user. When the key expires the system generates a new key for the le and adds the expired key to a list of old keys. The maximum number of expired keys that the system remembers is a parameter specied by the user. When the list of keys is at its maximal size the oldest expired key in the list is erased to make room for the new key. The above mechanism is very exible. We give some examples to illustrate its use. Suppose a user is preparing a document and he wants to make sure that old and invalid copies of his draft are inaccessible to anyone. He could set the key-life for that document to be one month and instruct the system to store 12 expired keys for this document. This means that a new key is generated once a month causing a year old key to be erased. The result is that once a month all backup copies older than a year are revoked. To revoke all copies that are more than 6 month old, the user can manually instruct the system to remove all keys that expired more than 6 month ago. Of course the user can decide to delete the le altogether by instructing the system to remove all keys (including the current key) for the le. In case of disk crash the most recent version of the document can be restored from tape using the current key. More generally, institutions may wish to adopt backup revocation policies. For instance, to prevent law suits regarding old data, an institution may decide to revoke all backup tapes that are more than 3 years old. This is done by instructing the system to delete all keys that expired more than 3 years ago. We point out once more that the revocation process has the eect of removing les from all old backup tapes without ever mounting a single tape. The most important component of our system is the key management. All encryption keys are stored in one le which we refer to as the key-le. This le should be protected meaning that only privileged processes should be allowed to read it. The key-le contains one record per each le that has ever been encrypted during back up. There are two types of entries in the key-le: directory and le entries. The structure of a single entry in the le is described in Figure 1. The elds in a le entry contain the lename, the maximum number of expired keys that the system should store, the life time of a single key and a list of keys. The list of keys includes the current key (as the rst entry in the list) followed by the expired keys ordered chronologically. When a new key is generated the keys in the list are shifted and the last (oldest) entry is lost. The elds in a directory entry specify the directory path and indicate whether all les in the directory and subdirectories should be encrypted during backup. When the cont ag is turned on the directory is scanned and all new les in it are added to the key-le. The num keys and key life elds for these new le entries are set to the values taken from the corresponding elds in the directory entry. A directory entry must always precede a le entry in order to specify the path to the le. The key-le is permanently stored on the le system. This le is extremely important since without
3 it the backup tapes are useless. For this reason the key-le must be backed up as well. However, the le can not be written to tape as is. If it were written to tape the system would not be able to permanently erase keys from the key-le. This would defeat the purpose of our system. Our solution is to generate a new master-key during every backup. The key-le will be written to tape after it has been encrypted using this new master-key. The master-key itself is not written to tape. Notice that in case of a disk crash, the master-key is crucial for recovering the key-le. Without the master-key the key-le can not be recovered and as a result all backup tapes using our system become useless. For this reason the master-key must be handled with care. We discuss methods for storing the master-key in Section 2.1. To make sure that the key-le is backed up to tape we treat it as any other le which is to be encrypted during backup. This means that the key-le is stored on the le system for which it used. Further, the key-le contains an entry which corresponds to the key-le itself. The le-name eld in this entry contains the key-le name and the key eld contains the master-key. Hence, the master-key is actually stored in the key-le and is used to encrypt the key-le during backup. To make sure that a new master-key is generated during every backup the key-life eld is set to zero. Similarly, to make sure that only the current master-key is stored, the num-keys eld is set to 1. This has the eect of revoking the old copy of the key-le during every backup. We can now describe the details of the backup and restore operations. The schematics of the backup procedure are described in Figure 2. We briey sketch these steps here. Initialize When the backup process is initialized the entire key-le is loaded into memory. Then all directories in the key-le which have the cont flag turned on are scanned and their contents is added to the memory image of the key le. The touch key file() routine will update the last modication date of the key-le. This guarantees that the key-le is written to tape even during an incremental backup 1. New keys Next, new keys are generated for all les who need them. A new key is generated for all les for which date key issued + key life < current date. The date key issued eld is updated for each new generated key. Write all les to tape Loop on all les in the le 1 An incremental backup of a certain level only backups les that were modied since the last backup of that level. system. Each le is dumped to tape, after encryption if necessary. The old master-key is erased from the key-le just before the key-le itself is dumped to tape. This ensures that the old master-key is not written to tape when the key-le is backed up. Had this not been done, old master-keys could be read from the backup tape. This would be disastrous for our system. Terminate Finally, write the key-le back to disk and store the new master-key using the methods described in Section 2.1. The modications to the restore operation are even simpler. During restore we use the key-le to nd the appropriate key for each le. The system rst reads the date written on the backup tape. This date is the date on which the backup was done. For each le to be restored the system retrieves the key used to encrypt the le on the backup date. This key is then used to decrypt the le when it is read from the tape. In case of a disk crash the rst thing that has to be recovered is the key-le. This is done by creating a temporary key-le containing a single entry. This entry contains the key-le as its le name and the master-key as the key. The operator can now use restore to recover and decrypt the most recent backed up version of the key-le. Now a full restore of the le system is possible. 2.1 Master key management As was mentioned above, the master-key is a crucial component of the system. Without it, all the backup tapes are useless. We rst describe the properties that a master-key storage system must satisfy. Observe that the master-key can not be written to tape in the clear. If it was, then the key-le on the tape would be accessible and with it all the les on the tape. This will again defeat the purpose of our system. Furthermore, wherever we choose to store the master-keys we must make sure that only the most recent key is accessible. As before, an old masterkey will enable access to the contents of old tapes. Hence, any system which stores master keys must \forget" all but the most recent one. We propose two solutions which can be used in conjunction with one another. The rst one is the simplest; at the end of each backup the computer operator is asked to write down (on paper or on a oppy disk) the current master-key. He then destroys his copy of the previous master-key. The second method involves an internet server
4 union keyfile_entry { } struct file_entry { /* Structure of file entry */ char *filename; char *keys[]; /* Keys used to encrypt file */ int num_keys; /* Number of keys to be saved */ time_t key_life; /* Life time of a single key */ time_t date_key_issued; /* Date current encryption key */ /* for file was issued */ time_t last_backup_date; /* Date file was last backed up */ } file struct dir_entry { /* Structure of directory entry */ char *dirpath; /* Directory path */ char cont_flag; /* Indicate if files in dir */ /* should be added to key-file */ int num_keys; /* Default num keys to be saved */ time_t key_life; /* Default life time of a key */ } dir; Figure 1: key-le structure load_key_file(); scan_sub_dir(); generate_new_keys(); touch_key_file(); /* key-file will be stored */ /* during incremental backup */ Loop on all files in file-system { file_entry = get_key_file_entry(current_file); if (file_entry!= NULL) { /* If file has an entry in */ key = get_key(file_entry); /* key-file then get */ else /* encryption key. Otherwise, */ key = NULL; /* don't encrypt file. */ if (is_key_file(current_file)) /* Erase current master-key */ erase_master_key_from_disk(); /* before writing key-file. */ Loop on blocks in file { /* Write file blocks to tape */ /* encrypting them if */ if (key!= NULL) /* necessary. */ encrypt(current_block, key); dump(current_block); /* Write block to tape. */ } if (file_entry!= NULL) /* Update backup date field */ file_entry->last_backup_date = current_date; } write_key_file(); /* Write key-file back to disk. */ store_master_key(); /* Take extra care to store the new master key. */ Figure 2: Backup operation
5 which is used for master-key storage. Suppose a site performs daily incremental backups. This is common in many sites. The master-key-storage-server generates a public/private key pair on a daily basis. Every day all sites performing backups encrypt their daily master-key using the server's current publickey and write the resulting string on their backup tape. In case of a disk crash a site can recover its daily master-key by performing the following steps: the local computer operator rst reads the encryption of the master-key written on his tape. He then sends the encrypted master-key to the storageserver. The storage-server, after authenticating the identity of the sender, decrypts the master-key and sends the result back to the computer operator. The operator can now restore his le system. The same public/private key pair can be used by all sites in the world which use daily (incremental) backups. Hence, the master-key-storage-server simply provides the service of generating a public/private key pair on a daily basis. The above description is not much dierent than a standard key escrow system. The new twist is that to make sure that old master-keys are inaccessible the master-key-storage-server must erase all but its most recent private-key. Otherwise old master-keys can be recovered from old tapes. These master-keys then enable anyone to read the contents of old tapes. Since the storage-server is providing a commercial service it is in its best interest to be trustworthy and indeed \forget" all old private keys. To increase the security and reliability of the scheme one can use k out of l secret sharing techniques [4]. This means that a given site will employ l storage-servers and exactly k of them are required to recover the daily master-key. Now an old master-key can not be recovered even if k 0 1 of the storage-severs are untrustworthy. Similarly, even if l0k storage-servers crash and lose their current private-key a site can still recover its current master-key. The parameters l and k can be ne tuned to the site's needs. For increased reliability some sites may wish to be able to access a small number (e.g. three) of old master-keys. For instance, if the most recent backup tape is lost, the previous one can be used if the corresponding master-key is still accessible. As a result some sites may want the storage-server to save a small number of its most recent private-keys. To accommodate this need the storage server can oer k (where k <10) types of public/private key pairs. For type 1 only the most recent private key is available. For type 2 the two most recent private keys are available, etc. This arrangement requires the storage-server to generate k new public/private key pairs daily. A site who wishes to have access to its three most recent master-keys may use a type 3 public key published by the storage server. 3 The user interface Two utilities enable a user to interact with our system. The rst utility enables a user to declare that a le or directory has the revocable-backup attribute. The second enables a user to revoke backup copies of his les. These two utilities comprise the most basic interface. Naturally utilities for obtaining the status of a given le are also provided. mkrvcbl The make-revocable command will add a le (or directory) to the key-le. The user can specify the key-life and num-keys parameters on the command line. The default values for these parameters is innity for the key-life and one for num-keys. This means that there is a single key associated with the le throughout the life of the le. This enables the user to revoke all backup copies of the le when he wishes to completely remove the le from the system. Executing mkrvcbl dir-name will add the directory to the key-le with the cont flag turned on. During backup all les in the directory and its subdirectories will be added to the key-le. Only the owner of the le (or directory) is permitted to apply mkrvcbl to the le (or directory). rvkbck The revoke-backup command is activated as rvkbck file-name [date]. Only the le owner is permitted to apply rvkbck to a le. The command removes all keys that expired before date from the le's entry in the key-le. If the date parameter is left blank the entire le's record is removed from the key-le. In doing so, all keys used to decrypt the le from the backup tapes are lost. As a result, the le can no longer be restored from the backup tapes. Unfortunately this is not quite true. Recall that the key-le itself is also backed up on tape. Hence, the removed entry can still be found in the backup version of the key-le. However, at the next backup the master-key will change making the old backed up version of the key-le useless. Therefore, the entry is permanently removed from the key-le after the next backup operation. For example, in a system where an incremental backup takes place daily the rvkbck file-name command will permanently remove the le within 24 hours of the time the command is issued. The two utilities described above enable a user to
6 manipulate the key-le according to his needs. By denition, the key-le contains an entry for every le that has ever been encrypted during backup (and has not been revoked). This could make the key-le large. Once every time period, e.g. once a year, the computer operator may wish to prune the key-le by removing all entries which correspond to les which are no longer present on the le system. This is done using the prune-key-le utility. prunekeyle The command prunekeyfile date will remove all entries in the key-le which correspond to les which no longer exist on the le system and whose last backup date is prior to `date'. The utility will write the removed entries to a le called key-file.`date'. This le will be backed up to tape as a regular le (without encryption) and then removed from the le system. Notice that by doing so the user is no longer able to revoke the backed up copy of the les corresponding to the removed entries. This is ne since these les are old les which are no longer present on the le system. 4 Summary and future work We described a system which enables a user to permanently remove a le from the le system and all backup tapes. The ability to revoke backup copies of les is important and may be of interest to many institutions. Our system is very easy to install and provides a simple user interface. Our scheme applies cryptography in a new way. Here cryptography is used to erase information rather than protect it. Since the backed up les are stored for extended periods of time it is desirable that the block cipher used to encrypt the les be extremely secure. Hence we suggest using block ciphers with longer keys than are usually used. For instance one could apply triple DES twice to obtain a 224 bit key. To simplify the installation of our system we chose not to modify the existing le system. Our implementation has the drawback that the backup key information does not become a part of the le. Thus, when the le is moved or copied the resulting le will not be securely backed up. A full-scale implementation of our scheme could embed a new le attribute in the le header. This attribute would indicate that the le is to be securely backed up. This way when the le is moved or copied, the new le will have the same attributes. The size of the key-le can be reduced by incorporating the ideas used in Lamport's one-time password scheme [3, pp. 230{232]. We thank Steven Bellovin [1] for pointing this out. Let f be a one way permutation. The idea is to only store the oldest accessible key in the key-le. The more recent keys can be obtained by repeatedly applying f to this key. When the oldest key k expires it is simply replaced by f(k). Since given f(k) it is hard to compute k we may say that k has been \forgotten". For eciency it is desirable to store both the oldest and most recent keys in the key-le. Using this approach we can make do with storing only two keys per key-le entry. As a nal note we point out that standard UNIX backup utilities, e.g. dump and tar, do not enable a user to specify a collection of les that should not be backed up. There are several types of les for which this option is important due to privacy considerations. The typical example is the history and cache les of the user's web browser. On the one hand, the information is usually not important to the user. On the other hand the information might be private and the user may not want extra copies of it oating around. We suggest that this feature be incorporated into commercial backup systems. Acknowledgments We thank Jim Roberts and Matt Norcross for a very helpful explanation of our local backup system. References [1] S. Bellovin, private communications. [2] M. Blaze, \A Cryptographic File System for Unix", available at doc/crypto-file-system.ps.asc.html [3] C. Kaufman, R. Perlman, M. Speciner, \Network Security", Prentice Hall, [4] A. Shamir, \How to share a secret", CACM, Vol. 22, Nov. 1979, pp. 612{613.
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Cryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
Review On Incremental Encrypted Backup For Cloud
Review On Incremental Encrypted Backup For Cloud Rohini Ghenand, Pooja Kute, Swapnil Shinde, Amit Shinde, Mahesh Pavaskar, Shitalkumar Jain Department of Computer Engineering MIT AOE [email protected]
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Overview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
How To Backup Your Hard Drive With Pros 4 Technology Online Backup
Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and
AxCrypt File Encryption Software for Windows. Quick Installation and Users Guide. Version 1.7 or later. July 2012
AxCrypt File Encryption Software for Windows Quick Installation and Users Guide Version 1.7 or later July 2012 Copyright 2005-2012 Svante Seleborg, Axantum Software AB 2(18) This guide describes how to
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Online Backup Solution Features
CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium
NovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH [email protected] Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
SVA Backup Plus Features
1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
NovaBACKUP Storage Server User Manual NovaStor / April 2013
NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change
How To Limit Volume In Bacula
Disk Backup Design Using Bacula This document is intended to provide insight into the considerations and processes required to design and implement a Disk Backup strategy for a large site with Bacula.
Encrypt-FS: A Versatile Cryptographic File System for Linux
Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique
Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER
COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their
Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016
Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Frequently Asked Questions
BACKUPS FAQ Why Backup? Backup Location Net Connections Programs Schedule Procedures Frequently Asked Questions I do a backup once a week and sometimes longer, is this sufficient? In most cases, I would
AxCrypt File Encryption Software for Windows. Quick Installation Guide. Version 1.6.3. January 2008
AxCrypt File Encryption Software for Windows Quick Installation Guide Version 1.6.3 January 2008 Copyright 2005-2008 Svante Seleborg, Axantum Software AB 2(19) This guide describes how to install and quickly
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Introduction. Ease-of-Use
Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for
eztechdirect Backup Service Features
eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets
File System Encryption with Integrated User Management
File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich [email protected] Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of
Introduction to Network Security Key Management and Distribution
Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology [email protected] http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution
Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution NOTICE This Technology Brief may contain proprietary information protected by copyright. Information
File-System Implementation
File-System Implementation 11 CHAPTER In this chapter we discuss various methods for storing information on secondary storage. The basic issues are device directory, free space management, and space allocation
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
Encryption and Digital Signatures
GreenNet CSIR Toolkit Briefing no.3 How to protect privacy, and your identity, online Written by Paul Mobbs for the GreenNet Civil Society Internet Rights Project, 2002. http://www.internetrights.org.uk/
Management of Hardware Passwords in Think PCs.
Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction
User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection
User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Outline How do you protect your critical confidential data?
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Computer Backup Strategies
Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
1 Construction of CCA-secure encryption
CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.
Receiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
Exam Papers Encryption Project PGP Universal Server Trial Progress Report
Exam Papers Encryption Project PGP Universal Server Trial Progress Report Introduction Using encryption for secure file storage and transfer presents a number of challenges. While the use of strong, well
Database Security. The Need for Database Security
Database Security Public domain NASA image L-1957-00989 of people working with an IBM type 704 electronic data processing machine. 1 The Need for Database Security Because databases play such an important
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
JBackpack Manual. Version 0.9.3. Abstract
JBackpack Manual JBackpack Manual Version 0.9.3 Abstract JBackpack is a personal backup program. It features incremental backups, network transparency and encryption. Table of Contents 1. Overview... 1
Forensic Analysis of Internet Explorer Activity Files
Forensic Analysis of Internet Explorer Activity Files by Keith J. Jones [email protected] 3/19/03 Table of Contents 1. Introduction 4 2. The Index.dat File Header 6 3. The HASH Table 10 4. The
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle
CRYPTOGRAPHY Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle Viswanathan Kodaganallur, Ph.D. Today almost all organizations use the Internet extensively for both intra- and inter-organizational
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
GPG Tutorial. 1 Introduction. 2 Creating a signing and encryption keys. 3 Generating a revocation certicate. Andreas Hirt July 12, 2009
GPG Tutorial Andreas Hirt July 12, 2009 1 Introduction The purpose of this document is to give a brief introduction on how to set up and use GPG, the GNU implementation of PGP. The reader must rst generate
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Extreme computing lab exercises Session one
Extreme computing lab exercises Session one Miles Osborne (original: Sasa Petrovic) October 23, 2012 1 Getting started First you need to access the machine where you will be doing all the work. Do this
USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------
USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support
Privacy Patterns in Public Clouds
Privacy Patterns in Public Clouds Sashank Dara Security Technologies Group, Cisco Systems, Bangalore email: [email protected] January 25, 2014 Abstract Internet users typically consume a wide range
Secure Backup. Chapter 6. 6.1 Secure Backups
Chapter 6 Secure Backup Problem Statement Alice considers her data very important. She has been around long enough to experience the painful loss of files due to arbitrary failures of software and hardware.
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
Hard drives dumped; information isn't DON'T BE SMUG IN THINKING PERSONAL DATA HAS BEEN ERASED By Larry Magid Special to the Mercury News
Erase Your Hard Drive Permanently erase files, emails, & Data from hard drive. Guaranteed! O&O DiskRecovery V3.0 Data Recovery for Windows with DeepScan function - Free Trial Delete porn history files
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
LiteCommerce Advanced Security Module. Version 2.8
LiteCommerce Advanced Security Module Version 2.8 Reference Manual Revision date: Jul/03/2007 LiteCommerce Advanced Security Module Reference Manual I Table of Contents Introduction...1 Administrator...2
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 6, June 2013, pg.307
DigiVault Online Backup Manager. User Guide
DigiVault Online Backup Manager User Guide Version 4.6.1.4 October 2005 DigiVault Backup Manager User Guide 2 Table of Contents 1 Using DigiVault Backup Manager... 3 1.1 System Tray Launcher... 3 1.2 Logon
BULLGUARD BAckUp GUIDE
BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Final Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
SECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
SecureVault Online Backup Service FAQ
SecureVault Online Backup Service FAQ C0110 SecureVault FAQ (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1. General 4 Q1. Can I exchange the client type between SecureVault PC Backup Manager and SecureVault
The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer
Jean-Baptiste Mardelle Rolf Eike Beer 2 Contents 1 Introduction 5 2 Getting Started 6 3 Using KGpg 8 3.1 Generating a key...................................... 8 3.2 Revoking a key.......................................
Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications
Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5
Last modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version 1.1.058
Last modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version 1.1.058 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Installing the TeamDrive Personal Server...
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Restore and Recovery Tasks. Copyright 2009, Oracle. All rights reserved.
Restore and Recovery Tasks Objectives After completing this lesson, you should be able to: Describe the causes of file loss and determine the appropriate action Describe major recovery operations Back
Database Security and Authorization
Database Security and Authorization 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3 Database Security and DBA 1.4 Access Protection, User Accounts,
A Novel Approach to combine Public-key encryption with Symmetric-key encryption
Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Ingres Backup and Recovery. Bruno Bompar Senior Manager Customer Support
Ingres Backup and Recovery Bruno Bompar Senior Manager Customer Support 1 Abstract Proper backup is crucial in any production DBMS installation, and Ingres is no exception. And backups are useless unless
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
SecureStore I.CA. User manual. Version 2.16 and higher
User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
